Preprint
Article

This version is not peer-reviewed.

Fuzzy Tsetlin Automata and Their Application in Analog Computing

Submitted:

10 October 2025

Posted:

11 October 2025

You are already at the latest version

Abstract
In the paper we suggest a system of fuzzy Tsetlin automata for analog computations. The system deals with fuzzy analogs of qubits and models operations of quantum gates used for quantum computations. These fuzzy information units are defined by matrix with fuzzy normalized rows. Operations with these units are conducted by fuzzy Tsetlin automata based on the uninorm and absorbing norm. It is demonstrated that the suggested system implements basic quantum computations that allows its application for general analog computing.
Keywords: 
;  ;  ;  

1. Introduction

It is widely accepted [1] that computation is a process of translating one sequence of symbols to another following a finite number of predefined rules. If the first sequence, called input sequence, and the second sequence, called output sequence, consist of the digits representing the numbers, then computation process is also known as calculation process.
Computation process implemented in physical devices is known as computing while the devices are called computation machines. Computation machines dealing with numbers are called arithmetic machines or calculators and are widely known as computers.
During the history of computation were developed innumerous types of computation machines which according to their basic functionality are combined into two wide classes: analog computers and digital computers.
In analog computers, input sequences represent the results of the measurements of certain observed external processes, and translation of these sequences into the outputs is conducted with respect to the internal processes which directly model the external processes [2]. In contrast, digital computers deal with input sequences without necessarily references to the observed reality and translate these sequences into the outputs following the rules which represent abstract mathematical operations [3]. Programming of analog computers is a tuning of the parameters of the modelling processes [4] and programming of digital computers is a defining the rules of translation of the inputs into the outputs [5].
Formally, analog computers operate with continuous functions such that each computer operation is defined by an operator in a certain space. Such principle of functionality of analog computers results in higher speed of calculations, but because of the noise, it leads to irreducible errors at each stage of computing from data transmission to data storing.
This weakness led to a decrease in interest in analog computing and gave rise to the development of digital computers operating with a finite number of variables with the values from discrete alphabets, usually from the binary alphabet 0 ,   1 .
A new wave of interest to analog computation was initialed by the ideas of quantum computing [6,7] which reintroduced the considerations of the logic of quantum mechanics [8] and its use in computations. Quantum mechanical computation assumes that the input sequences are transformed using quantum mechanical operators and the output sequences are obtained by observations of the results of such transformations [9]. An information unit used in quantum mechanical computation is a qubit which is a superposition of the values 0 and 1 . Implementation of such computations assumes the use of quantum mechanical devices which conduct these quantum mechanical transformations and return the results in the form of macroscopic observable values.
Direct analogy between representation of the data in quantum mechanical computation and in fuzzy sets gave a rise to the attempts to model quantum mechanical computation by the means of fuzzy logic [10].
Probably, one of the most successful models was suggested by Hannachi et al. [11,12] who defined fuzzy models of quantum gates and constructed fuzzy version of one- and two-bits Deutsch-Jozsa algorithm [13]. Later, these models were adopted for control of mobile robots [14,15] that validates possibility of their implementation in nonquantum physical devices. Along with that, the Hannachi et al. model does not include complex gates conducting rotations of the qubits which are necessary for a complete quantum computing system.
Moreover, as it was demonstrated by Kreinovich et al. [16], there is a crucial difference between quantum and fuzzy logics led by the “square root of not” appearing in quantum logic. Later, Kosheleva and Kreinovich [17] demonstrated that formulation of quantum logic by the means of fuzzy logic requires additional terms and operations. Kosheleva and Kreinovich interpreted the resulting logic as complex fuzzy logic [18,19] that, however, does not exclude the use of other rich enough fuzzy logics.
In the paper, we suggest a fuzzy system which implements quantum computations and can be used for analog computations in general. The system consists of fuzzy Tsetlin automata that utilize extended uninorm and absorbing norm. To model the qubits representing the data, in the system we suggest fuzzy analog of qubits – the f-bits – which are matrix extensions of the qubits with uninorm based normalization. We demonstrate that the suggested system implements basic quantum computations that allows its application for general analog computing.

2. Materials and Methods

The suggested system is based on fuzzy Tsetlin automata and deals with the operations which represent the operations used in quantum computations. In the section, we start with the basic notes on quantum gates and the methods of quantum computations and then recall definition of fuzzy Tsetlin automaton and its main properties.

2.1. Basic Operations of Quantum Computation

The information units and operations used in quantum computations are defined as follows. Since quantum computations are not a subject of this paper, we use commonly known vector and matrix notation; for widely accepted quantum mechanical notation used in quantum information theory see e.g. the book [20] by Nielsen and Chuang.
In quantum computations, a unit of information is called qubit and is represented by a two-elements complex vector z = z 1 , z 2 such that 0 z 1 2 + z 2 2 1 . The distinguished vectors O = 1,0 and I = 0,1 are associated with classical false 0 and true 1 values, and any vector z is represented by a combination
z = z 1 , z 2 = z 1 I + z 2 O = z 1 0,1 + z 2 1,0
of the vectors O and I .
Usually, row-vector z = z 1 , z 2 is denoted by z and is called bra-vector and column vector z = z 1 , z 2 T is denoted by z and is called ket-vector. Vectors O = 0 and I = 1 represent the states of electron “spin up” and “spin down”, respectively, and the vectors 1 2 , 1 2 = 1 2 1 + 1 2 0 and 1 2 , 1 2 = 1 2 1 1 2 0 represent the states “spin right” and “spin left”, respectively.
The basic operators applied to the qubits are represented by the following matrices called quantum gates:
-
Pauli operators:
I = 1 0 0 1 ,   X = 0 1 1 0 ,   Y = 0 i i 0   and   Z = 1 0 0 1 ;
-
Square root of not:
V = 1 2 1 + i 1 i 1 i 1 + i = X ;
-
Hadamard operator:
H = 1 2 1 1 1 1 = 1 2 X + Z ;
-
Phase shift operator:
S = 1 1 1 i = Z ;
-
T-gate:
T = 1 1 1 e i π / 4 = S = Z 4 ;
-
Two-qubit controlled NOT (CNOT) operator:
C N O T = 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 0 = I 0 0 X .
The square root of not is an operator which acts as V V z = X z = not z ; consequently, the phase shift operator acts as S S z = Z z and the T-gate operators acts as T T z = S z .
Note that in contrast to the Boolean operators, the one-qubit operators are reversible, that is X X z = z , H H z = z and so on.
Our goal is to suggest fuzzy operations which emulate these quantum gates.

2.2. Fuzzy Tsetlin Automata

The suggested system is based on fuzzy Tsetlin automata. These automata extend binary Tetlin automata [21] which are defined as follows.
Let A be an automation with the set of states 0 ,   1 , and assume that being in the state s i 0 ,   1 the automaton receives an income o 0,1 such that o = 1 is interpreted as a payoff and o = 0 is interpreted as a reward (no payoff).
If o = 1 , then the automaton changes its state to the other, and if o = 0 , the automaton stays in its current state. Such transitions of the automaton A are defined by the matrix ρ o = ρ i j o such that ρ 1 = 0 1 1 0 and ρ 0 = 1 0 0 1 .
It is easy to demonstrate that such behavior of the Tsetlin automaton A is represented by Boolean x o r operator
s t + 1 = xor s t , o t ,   s t 0 ,   1 ,   o t 0 ,   1 ,   t = 0 ,   1 ,   2 ,   ,
that allows direct extension of binary automaton A to fuzzy automaton A ~ which operates with the states and incomes from the interval 0 ,   1 .
To define fuzzy Tsetlin automaton A ~ we need the following fuzzy aggregators that extend Boolean operations.
Function θ : 0 ,   1 × 0 ,   1 0 ,   1 with the parameter θ 0 ,   1 such that
  • x θ y = y θ x (commutativity),
  • x θ y θ z = x θ y θ z (associativity),
  • x y implies x θ z y θ z (monotonicity),
  • θ θ x = x for some θ 0 ,   1 (identity),
    and such that 1 is a t -norm and 0 is a t -conorm is called uninorm. Parameter θ is called identity or neutral element of the uninorm.
Let θ be a uninorm with the neutral element θ 0 , 1 and let θ : 0 , 1 0 , 1 be a function that satisfies the following requirements:
  • θ is continuous,
  • θ is strictly monotonously decreasing.
If for any x , y 0 , 1 holds
θ x θ y = θ x θ θ y .
then function θ is called strong negation or negation, for briefness, with respect to the uninorm θ .
Function ϑ : 0 , 1 × 0 , 1 0 , 1 with the parameter ϑ 0 , 1 such that
  • x ϑ y = y ϑ x (commutativity),
  • x ϑ y ϑ z = x ϑ y ϑ z (associativity),
  • ϑ ϑ x = ϑ for any x 0 ,   1 (existence of zero)
    is called absorbing norm. Parameter ϑ is called absorbing element of the absorbing norm.
Similar to the negation operator, given absorbing norm ϑ it is defined the division operator ϑ : 0 , 1 × 0 , 1 0 , 1 such that
x ϑ y ϑ y = x ϑ y ϑ y = x .
The value
λ = y ϑ y
is called unit with respect to the absorbing norm ϑ .
Uninorm was defined by Yager and Rybalov in the paper [22], negation – by Dombi in the paper [23], absorbing norm – by Rudas in the paper [24] and division – by Fodor et al. in the report [25]. For further definitions and facts see the book [26] and references therein.
Let θ be a uninorm with neutral element θ 0 ,   1 . Then there exists an invertible continuous strictly monotonously increasing function u : 0 ,   1 , with the limits lim x 0 u x = and lim x 1 u x = + , such that u θ = θ and for any x , y 0 , 1 holds
x θ y = u 1 u x + u y .
The function u is called generating function of the uninorm θ .
Let θ be a negation with respect to the uninorm θ based on the generating function u . Then
θ x = u 1 u x .
Finally, let ϑ be an absorbing norm with absorbing element ϑ 0 ,   1 . Then there exists an invertible continuous strictly monotonously increasing function v : 0 ,   1 , with the limits lim x 0 v x = and lim x 1 v x = + , such that v ϑ = ϑ and for any x , y 0 , 1 holds
x ϑ y = v 1 v x × v y .
The function v is called generating function of the absorbing norm ϑ .
Since absorbing norm is a fuzzy extension of the Boolean n o t   x o r operator, fuzzy Tsetlin automaton can be defined as a direct negation of the absorbing norm.
Fuzzy Tsetlin automaton A ~ is a fuzzy automaton with the state transition function
s t + 1 = θ s t ϑ o t ,   t = 0 ,   1 ,   2 ,  
where s t 0 , 1 is a state and o t 0 , 1 is an input of the automaton at time t .
Following this definition, fuzzy Tsetlin automaton can be considered as a simplest form of the Tsetlin neuron used in fuzzy neural networks [26,27].

3. Results

Let us start with the definition of fuzzy information unit. We assume that such a unit is analog to the quantum information unit – the qubit – but, in contrast to the probabilities of quantum states, it represents the truth values of the statements.
Let γ θ = γ i j 2 × 2 be a real matrix. If in the matrix γ θ holds
0 γ 11 1 ,   0 γ 22 1 ,   and   γ 12 = θ γ 11 ,   γ 21 = θ γ 22 .
then it is considered as a fuzzy information unit and is called f-bit.
Note that in contrast to the qubit z which is a complex vector with the elements associated with the probabilities of the quantum states, the f-bit γ θ is a real matrix. The elements of this matrix are interpreted as truth values and are normalized such that
γ 11 θ γ 12 = θ and γ 21 θ γ 22 = θ .
In other words, similar to the qubit z = z 1 , z 2 where the values z 1 2 and z 2 2 are associated with the probabilities of the complementary events, in the f-bit γ θ = γ i j 2 × 2 the values in the rows are associated with the truth values of the complementary statements.
The suggested system consists of four fuzzy Tsetlin automata A ~ acting with the elements of fuzzy information units.
Let c θ = c i j 2 × 2 be a matrix of control values. We assume that matrix c θ has a structure of f-bit, namely
0 c 11 1 ,   0 c 22 1 ,   and   c 12 = θ c 11 ,   c 21 = θ c 22 .
Let x θ be an input f-bit and let c θ be a control f-bit. Then, controlled information processing is defined as follows:
y 11 = θ x 11 ϑ c 11 ,   y 12 = x 12 ϑ c 12 ,   y 21 = x 21 ϑ c 21 ,   y 22 = θ x 22 ϑ c 22 ,
In other words, the automata processing the elements of main diagonals are fuzzy Tsetlin automata and the automata processing the element of antidiagonals are negated fuzzy Tsetlin automata.
In brief, this operation is written as
y = T ~ x θ , c θ .
Lemma 1.
If  θ = ϑ = 1 2  , then  y  is an f-bit.
Proof. We need to show that
0 y i j 1 ,   i , j = 1 ,   2 ,
and that
y 12 = θ y 11   and   y 21 = θ y 22 .
The first statement follows directly from definitions of the operations θ and ϑ for any θ and ϑ .
Consider the second statement. Since θ = ϑ = 1 2 , we have
y 12 = x 12 ϑ c 12 = θ x 11 ϑ θ c 11 = x 11 ϑ c 11 = θ y 11 ,
and
y 21 = x 21 ϑ c 21 = θ x 22 ϑ θ c 22 = x 22 ϑ c 22 = θ y 22 .
Note that if θ = ϑ 1 2 , then the above transformations do not hold, and the statement of the theorem is not true. □
Let θ = ϑ = 1 2 . We define the following control matrices.
-
Fuzzy Pauli control matrices:
I ~ θ = θ λ λ λ θ λ ,   X ~ θ = λ θ λ θ λ λ ,
Y ~ θ = λ θ λ λ θ λ   and   Z ~ θ = θ λ λ θ λ λ ;
-
Fuzzy root of not:
V ~ θ = ν θ ν θ ν ν ,   s . t .   ν θ ν = λ ;
-
Fuzzy Hadamard control matrix:
H ~ θ = θ λ θ θ λ λ θ λ λ θ λ θ λ θ θ λ ;
-
Fuzzy phase shift:
S ~ θ = θ ν ν θ ν ν ,   s . t .   ν θ ν = λ ;
-
Fuzzy T-gate:
T ~ θ = θ τ τ θ τ τ ,   s . t .   τ θ τ = ν
-
Fuzzy two-f-bit controlled NOT (CNOT):
C N O T ~ θ = θ λ λ λ θ λ θ θ θ θ θ θ θ θ λ θ λ θ λ 1 λ = I ~ θ θ θ X ~ θ .
Since 0 λ 1 , each presented matrix is an f-bit.
Theorem 1.
Operation  T ~  with the defined above control matrices implements the basic gates of quantum computation.
Proof. Denote the input qubit by
z = z 1 z 2 ,
and the input f-bit by
x θ = x 1 θ x 1 θ x 2 x 2 .
We have (for detailed calculations see Appendix A):
-
Pauli operators:
I z = z 1 z 2 ,   X z = z 2 z 1 ,   Y z = i z 2 i z 1 ,   Z z = z 1 z 2 ;
-
Fuzzy Pauli operators:
T ~ x θ , I ~ θ = x 1 θ x 1 θ x 2 x 2 ,   T ~ x θ , X ~ θ = θ x 1 x 1 x 2 θ x 2 ,   T ~ x θ , Y ~ θ = θ x 1 x 1 θ x 2 x 2 ,   T ~ x θ , Z ~ θ = x 1 θ x 1 x 2 θ x 2 ;
-
Square root of not:
V z = 1 2 z 1 + z 2 + i z 1 z 2 z 1 + z 2 + i z 2 z 1 ;
-
Fuzzy root of not:
T ~ x θ , V ~ θ = θ x 1 ϑ ν x 1 ϑ ν x 2 ϑ ν θ x 2 ϑ ν ,   ν θ ν = λ ;
-
Hadamard operator:
H z = 1 2 z 1 + z 2 z 1 z 2 ;
-
Fuzzy Hadamard operator:
T ~ x θ , H ~ θ = x 1 ϑ λ θ λ θ x 1 ϑ λ θ λ θ x 2 ϑ λ θ λ x 1 ϑ λ θ λ ;
-
Phase shift operator:
S z = z 1 + z 2 z 1 + i z 2 ;
-
Fuzzy phase shift operator:
T ~ x θ , S ~ θ = x 1 ϑ ν θ x 1 ϑ ν x 2 ϑ ν θ x 2 ϑ ν ,   ν θ ν = λ ;
-
T-gate:
T z = z 1 + z 2 z 1 + e i π / 4 z 2 ;
-
Fuzzy T-gate:
T ~ x θ , T ~ θ = x 1 ϑ τ θ x 1 ϑ τ x 2 ϑ τ θ x 2 ϑ τ ,   τ θ τ = ν .
Finally, let
w = w 1 w 2 ,
be additional qubit and
y θ = y 1 θ y 1 θ y 2 y 2 .
be additional f-bit.
The C N O T gate and two-f-bit extension of the T ~ operation with fuzzy C N O T control matrix act as follows:
-
Two-qubit controlled NOT (CNOT) operator:
C N O T z w = z 1 z 2 w 2 w 1 ;
-
Fuzzy two-f-bit controlled NOT (CNOT) operator:
T ~ x θ , y θ , C N O T ~ θ = x 1 θ x 1 θ x 2 x 2 θ θ θ θ θ θ θ θ θ y 1 y 1 y 2 θ y 2 .
Representation of the C N O T gate by its fuzzy analog ends the proof. □
First, let us demonstrate that the operation T ~ with the introduced fuzzy Pauli control matrices meets the main property of quantum gates.
Lemma 2.
Operation  T ~  with fuzzy Pauli control matrices  I ~ θ  ,  X ~ θ ,  Y ~ θ  and  Z ~ θ  is reversible such that
T ~ 2 x θ , c θ = x θ .
Proof. Let
x θ = x 1 θ x 1 θ x 2 x 2   and   c θ = c 1 θ c 1 θ c 2 c 2
be an f-bit and a control matrix, respectively.
Then
T ~ 2 x θ , c θ = T ~ T ~ x 1 θ x 1 θ x 2 x 2 , c 1 θ c 1 θ c 2 c 2 , c 1 θ c 1 θ c 2 c 2 = = T ~ θ x 1 ϑ c 1 x 1 ϑ c 1 x 2 ϑ c 2 θ x 2 ϑ c 2 , c 1 θ c 1 θ c 2 c 2 = = x 1 ϑ c 1 ϑ c 1 θ x 1 ϑ c 1 ϑ c 1 θ x 2 ϑ c 2 ϑ c 2 x 2 ϑ c 2 ϑ c 2 .
For the fuzzy Pauli control matrices I ~ θ , X ~ θ , Y ~ θ and Z ~ θ , we have either c i = λ or c i = θ λ , i = 1 ,   2 . Then
c i ϑ c i = λ ,   i = 1 ,   2 .
Hence,
T ~ 2 x θ , c θ = x 1 ϑ c 1 ϑ c 1 θ x 1 ϑ c 1 ϑ c 1 θ x 2 ϑ c 2 ϑ c 2 x 2 ϑ c 2 ϑ c 2 = = x 1 ϑ λ θ x 1 ϑ λ θ x 2 ϑ λ x 2 ϑ λ = x 1 θ x 1 θ x 2 x 2 = x θ ,
and operation T ~ is reversible. □
Corollary 1.
C N O T ~ θ  is reversible.
Proof. Reversibility of C N O T ~ θ follows directly from the reversibility of I ~ θ and X ~ θ . □
Now, let us demonstrate the relations between the introduced control matrices.
Lemma 3.
  I ~ θ θ X ~ θ = θ θ θ θ ,   Y ~ θ θ Z ~ θ = θ θ θ θ ,   I ~ θ θ I ~ θ = H ~ θ ,   V ~ θ θ V ~ θ = X ~ θ ,   T ~ θ θ T ~ θ = S ~ θ ,   S ~ θ θ S ~ θ = Z ~ θ .
Proof. The statement is obtained by direct calculations (see Appendix B). □
Note that T ~ operation with fuzzy Hadamard control matrix H ~ θ and the control matrices V ~ θ , S ~ θ and T ~ θ is not reversible. Along with that, for these matrices we can define the operations which, together with corresponding operators, provide the reversibility of the operation T ~ .
Let x 0 , 1 . Denote by
θ n x = x θ θ x n   t i m e s   and   ϑ n x = x ϑ ϑ x n   t i m e s ,
the n times application of the uninorm θ and absorbing norm θ . It means,
θ 1 x = x   and   ϑ 1 x = x .
For any n = 1 ,   2 , we have,
ϑ n λ = λ ,
and since ν θ ν = λ and τ θ τ = ν , we have for even n
θ n ν = θ n / 2 λ   and   θ n τ = θ n / 2 ν ,
and for odd n
θ n ν = ν θ θ n 1 / 2 λ   and   θ n τ = τ θ θ n 1 / 2 ν .
We introduce the following matrices
Σ n x   |   θ = θ n x θ n x θ n x θ n x   and   Σ n 1 x   |   θ , ϑ = λ ϑ θ n x λ ϑ θ n x λ ϑ θ n x λ ϑ θ n x ,   Π n x   |   ϑ = ϑ n x ϑ n x ϑ n x ϑ n x   and   Π n 1 x   |   ϑ = λ ϑ ϑ n x λ ϑ ϑ n x λ ϑ ϑ n x λ ϑ ϑ n x .
Since we assume that θ = θ = 1 2 , below we will omit the notation of θ and θ and will write Σ n x , Σ n 1 x , Π n x and Π n 1 x .
To define the required operators, we will need the matrices
Σ 4 1 λ = λ ϑ θ 4 λ λ ϑ θ 4 λ λ ϑ θ 4 λ λ ϑ θ 4 λ = = λ ϑ λ θ θ λ 4   t i m e s λ ϑ λ θ θ λ 4   t i m e s λ ϑ λ θ θ λ 4   t i m e s λ ϑ λ θ θ λ 4   t i m e s ,
Π 2 1 ν = λ ϑ ϑ 2 ν λ ϑ ϑ 2 ν λ ϑ ϑ 2 ν λ ϑ ϑ 2 ν = λ ϑ ν ϑ ν λ ϑ ν ϑ ν λ ϑ ν ϑ ν λ ϑ ν ϑ ν .
and
Π 4 1 τ = λ ϑ ϑ 4 τ λ ϑ ϑ 4 τ λ ϑ ϑ 4 τ λ ϑ ϑ 4 τ = = λ ϑ τ ϑ ϑ τ 4   t i m e s λ ϑ τ ϑ ϑ τ 4   t i m e s λ ϑ τ ϑ ϑ τ 4   t i m e s λ ϑ τ ϑ ϑ τ 4   t i m e s .
Lemma 4.
For fuzzy Hadamard operator holds
T ~ T ~ 2 x θ , H ~ θ , Σ 2 1 λ   = x θ .
Proof. The statement is obtained by direct calculations (see Appendix C). □
Similar statement holds for fuzzy square root of not V ~ θ , fuzzy phase shift S ~ θ and fuzzy T-gate T ~ θ .
Lemma 5.
T ~ T ~ 2 x θ , V ~ θ , Π 2 1 ν   = x θ ,   T ~ T ~ 2 x θ , S ~ θ , Π 2 1 ν   = x θ , T ~ T ~ 4 x θ , T ~ θ , Π 4 1 τ   = x θ .
Proof. The statement is obtained by direct calculations (see Appendix D). □
Finally, let us present an example of the generating function u v with θ = ϑ = 1 2 and corresponding values λ , ν and τ .
Example 1.
Let x 0 , 1 and ξ , and assume that [26]
u x = v x = ln x α 1 x α ,   u 1 ξ = v 1 ξ = e ξ 1 + e ξ 1 / α ,
where α = 1 / log 2 1 θ , θ 0 , 1 .
For θ = 1 2 we have α = 1 / log 2 1 1 / 2 = 1 . So
u x = v x = ln x 1 x ,   u 1 ξ = v 1 ξ = e ξ 1 + e ξ .
Then
λ 0.7311 ,   ν 0.6225   and   τ 0.5622 .
In fact,
λ = x ϑ x = u 1 u x / u x = u 1 1 = e 1 + e 0.7311 .
Then
u 1 u ν + u ν = u 1 2 u ν = exp 2 ln ν 1 ν 1 + exp 2 ln ν 1 ν = ν 2 2 ν 1 ν + 1 = λ ,
which gives ν 0.6225 and similarly
u 1 u τ + u τ = u 1 2 u τ = exp 2 ln τ 1 τ 1 + exp 2 ln τ 1 τ = τ 2 2 τ 1 τ + 1 = ν
gives τ 0.5622 . □
Summarizing, operation T ~ with the defined fuzzy control matrices implements the corresponding quantum gates. Operation T ~ is reversible for the fuzzy Pauli operators I ~ θ , X ~ θ , Y ~ θ and Z ~ θ and for fuzzy controlled not operator C N O T ~ θ , and for fuzzy Hadamard operator H ~ θ operation it is reversed using the matrix Σ 2 1 λ . For square root of not V ~ θ and fuzzy phase shift operation T ~ is reversed using the matrix Π 2 1 ν and for the fuzzy T-gate T ~ θ it is reversed using the matrix Π 4 1 τ . Finally, example 1 demonstrates that the introduced operations and values are computable.
These properties of operation T ~ with the defined fuzzy control matrices allows its direct application in quantum algorithms. Below, we illustrate the use of this operation by formulating fuzzy version of the one qubit Deutsch-Jozsa algorithm [13].
Example 2.
In this example, we formulate the fuzzy version of the one qubit Deutsch-Jozsa algorithm [13], which recognizes whether a Boolean function f : 0,1 0,1 is constant (its outputs do not depend on inputs) or balanced (a half of its outputs are zeros and a half are units). The example is inspired by the implementation of the model suggested by Hannachi, Hatakeyama and Hirota [12].
Recall that since we consider Boolean function f of one argument, it can be one of four functions f k : 0,1 0,1 , k = 1 , , 4 , such that the functions f 1 x = 0 and f 2 x = 1 are constant and the functions f 3 x = x and f 4 x = not   x are balanced.
To solve this problem, classical algorithm requires two calls of the function f . At first, the algorithm sets x = 0 . Assume that the result is f 0 = 0 . It means that the function f is either f 1 (constant) or f 3 (balanced). Now the algorithm sets x = 1 . Then the result is either f 1 = 0 , which means that the function f is f 1 (constant), or f 1 = 1 , which means that the function f is f 3 (balanced). Certainly, the algorithm can start with the value x = 1 and then set the value x = 0 ; in this case it will choose among the functions f 2 and f 4 .
In contrast, the Deutsch-Jozsa algorithm solves this problem in one call of the operator associated with the function f . Detailed description of the Deutsch-Jozsa algorithm is given in Appendix E.
Following the scheme of the Deutsch-Jozsa algorithm, the suggested algorithm obtains two f-bits x θ and y θ as an input, applies to them fuzzy Hadamard operator T ~ , H ~ θ , then applies a two-f-bit oracle operator T ~ , U ~ θ f . The obtained f-bits are processes by the operator T ~ T ~ , H ~ θ , Σ 2 1 λ   , which is an inverse of the operator T ~ , H ~ θ , and the resulting f-bits x θ and y θ are compared. If x θ = y θ , then the function f is constant and if x θ y θ , then the function f is balanced.
Similar to the Deutsch-Jozsa algorithm, we assume that the functions f 1 , f 2 , f 3 and f 4 are respectively associated with the two-f-bit operators with the control matrices:
U ~ θ 1 = I ~ θ θ θ I ~ θ ,   U ~ θ 2 = X ~ θ θ θ X ~ θ ,   U ~ θ 3 = I ~ θ θ θ X ~ θ   and   U ~ θ 4 = X ~ θ θ θ I ~ θ .
respectively.
Let
x θ = x 1 θ x 1 θ x 2 x 2   and   y θ = y 1 θ y 1 θ y 2 y 2 .
The two-f-bit state ψ ~ 0 is defined as a fuzzy superposition of the f-bits x θ and y θ :
ψ ~ 0 = x θ θ y θ θ y θ x θ .
To the state ψ ~ 0 the two-f-qubit Hadamard operator is applied:
ψ ~ 1 = T ~ ψ ~ 0 , H ~ θ = x θ ϑ λ θ λ y θ ϑ λ θ λ y θ ϑ λ θ λ x θ ϑ λ θ λ .
The two-f-qubit state ψ ~ 1 is processed by the operator T ~ , U ~ θ f
ψ ~ 2 = T ~ ψ ~ 1 , U ~ θ f = = θ x θ ϑ λ θ λ ϑ u ~ 1 y θ ϑ λ θ λ ϑ θ y θ ϑ λ θ λ ϑ θ θ x θ ϑ λ θ λ ϑ u ~ 2 = = θ x θ ϑ λ θ λ ϑ u ~ 1 θ θ θ x θ ϑ λ θ λ ϑ u ~ 2 ,
where u ~ 1 and u ~ 2 stand for the matrices I ~ θ and X ~ θ with respect to the control matrices U ~ θ 1 , U ~ θ 2 , U ~ θ 3 and U ~ θ 4 .
The state ψ ~ 2 is processed by the reverse fuzzy Hadamard operator
ψ ~ 3 = T ~ T ~ ψ ~ 2 , H ~ θ , Σ 2 1 λ   = = x θ ϑ λ θ λ ϑ u ~ 1 ϑ λ θ λ θ θ x θ ϑ λ θ λ ϑ u ~ 2 ϑ λ θ λ = = x θ ϑ u ~ 1 θ θ x θ ϑ u ~ 2 ,
Finally, if x θ ϑ u ~ 1 = x θ ϑ u ~ 2 , then the function f is constant and if x θ ϑ u ~ 1 x θ ϑ u ~ 2 , then the function f is balanced.
Hence, similarly to the Deutsch-Jozsa algorithm, the problem of recognition of the constant and balanced function is solved by a single call of the operator associated with the function f .
It is clear that similar to the Deutsch-Jozsa algorithm, the suggested fuzzy algorithm is useless and does not solve any practical problem. Along with that, as the Deutsch-Jozsa algorithm demonstrates that effectiveness of quantum computations, the suggested fuzzy algorithm demonstrates that using the suggested operations the problem can be solved as effectively as by quantum algorithm. □

4. Discussion

In the paper we suggested a fuzzy system for implementing analog or hybrid computations. The units of information in the system are defined as -f-bits which are the matrices of definite form. Operations in the system are defined using fuzzy Tsetlin automata and are implemented by the operator with definite control matrices.
The considered control matrices are such that the resulting operator implements operations used in quantum computations. As a result, the system implements quantum computations by means of fuzzy logic that is illustrated by fuzzy implementation of the Deutsch-Jozsa algorithm.
The suggested operator with the presented control matrices is certainly not a unique possible implementation of the system. It was chosen to coincide with the gates used in quantum computations and to demonstrate an effectiveness of the suggested system and the use of fuzzy Tsetlin automata for analog computations.
Further research will concentrate on simulations of the suggested scheme and its implementation using standard microelectronic devices.

Author Contributions

Conceptualization, E.K. and A.R.; methodology, A.R.; software, E.K.; validation, E.K. and A.R.; formal analysis, E.K.; investigation, E.K.; writing—original draft preparation, E.K.; writing—review and editing, A.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors thank Prof. E. Bormashenko from Ariel University for fruitful discussions which inspired the work on this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Calculations for the proof of Theorem 1.
-
Pauli operators:
I z = 1 0 0 1 × z 1 z 2 = z 1 z 2 ,   X z = 0 1 1 0 × z 1 z 2 = z 2 z 1 ,   Y z = 0 i i 0 × z 1 z 2 = i z 2 i z 1 ,   Z z = 1 0 0 1 × z 1 z 2 = z 1 z 2 ;
-
Fuzzy Pauli operators:
T ~ x θ , I ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , θ λ λ λ θ λ = = θ x 1 ϑ θ λ θ x 1 ϑ λ θ x 2 ϑ λ θ x 2 ϑ θ λ = x 1 θ x 1 θ x 2 x 2 ,   T ~ x θ , X ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , λ θ λ θ λ λ = = θ x 1 ϑ λ θ x 1 ϑ θ λ θ x 2 ϑ θ λ θ x 2 ϑ λ = θ x 1 x 1 x 2 θ x 2 ,   T ~ x θ , Y ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , λ θ λ λ θ λ = θ x 1 ϑ λ θ x 1 ϑ θ λ θ x 2 ϑ λ θ x 2 ϑ θ λ = θ x 1 x 1 θ x 2 x 2 ,   T ~ x θ , Z ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , θ λ λ θ λ λ = θ x 1 ϑ θ λ θ x 1 ϑ λ θ x 2 ϑ θ λ θ x 2 ϑ λ = x 1 θ x 1 x 2 θ x 2 ;
-
Square root of not:
V z = 1 2 1 + i 1 i 1 i 1 + i × z 1 z 2 = 1 2 z 1 + z 2 + i z 1 z 2 z 1 + z 2 + i z 2 z 1 ;
-
Fuzzy root of not ( ν θ ν = λ ):
T ~ x θ , V ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , ν θ ν θ ν ν = = θ x 1 ϑ ν θ x 1 ϑ θ ν θ x 2 ϑ θ ν θ x 2 ϑ ν = θ x 1 ϑ ν x 1 ϑ ν x 2 ϑ ν θ x 2 ϑ ν ;
-
Hadamard operator:
H z = 1 2 1 1 1 1 × z 1 z 2 = 1 2 z 1 + z 2 z 1 z 2 ;
-
Fuzzy Hadamard operator:
T ~ x θ , H ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , θ λ θ θ λ λ θ λ λ θ λ θ λ θ θ λ = = θ x 1 ϑ λ θ λ θ x 1 ϑ λ θ λ θ x 2 ϑ λ θ λ θ x 2 ϑ θ λ θ θ λ = x 1 ϑ λ θ λ θ x 1 ϑ λ θ λ θ x 2 ϑ λ θ λ x 1 ϑ λ θ λ ;
-
Phase shift operator:
S z = 1 1 1 i × z 1 z 2 = z 1 + z 2 z 1 + i z 2 ;
-
Fuzzy phase shift operator ( ν θ ν = λ ):
T ~ x θ , S ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , θ ν ν θ ν ν = = θ x 1 ϑ θ ν θ x 1 ϑ ν θ x 2 ϑ θ ν θ x 2 ϑ ν = x 1 ϑ ν θ x 1 ϑ ν x 2 ϑ ν θ x 2 ϑ ν ;
-
T-gate:
T z = 1 1 1 e i π / 4 × z 1 z 2 = z 1 + z 2 z 1 + e i π / 4 z 2 ;
-
Fuzzy T-gate ( τ θ τ = ν ):
T ~ x θ , T ~ θ = T ~ x 1 θ x 1 θ x 2 x 2 , θ τ τ θ τ τ = = θ x 1 ϑ θ τ θ x 1 ϑ τ θ x 2 ϑ θ τ θ x 2 ϑ τ = x 1 ϑ τ θ x 1 ϑ τ x 2 ϑ τ θ x 2 ϑ τ .
-
Two-qubit controlled NOT (CNOT) operator:
C N O T z w = 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 0 × z 1 z 2 w 1 w 2 = z 1 z 2 w 2 w 1 ;
-
Fuzzy two-f-bit controlled NOT (CNOT) operator:
T ~ x θ , y θ , C N O T ~ θ = = T ~ x 1 θ x 1 θ x 2 x 2 θ θ θ θ θ θ θ θ θ θ θ θ , θ θ θ θ θ θ θ θ θ θ θ θ y 1 θ y 1 θ y 2 y 2 , θ λ λ λ θ λ θ θ θ θ θ θ θ θ λ θ λ θ λ 1 λ = = θ x 1 ϑ θ λ θ x 1 ϑ λ θ x 2 ϑ λ θ x 2 ϑ θ λ θ θ θ θ θ θ θ θ θ y 1 ϑ λ θ y 1 ϑ θ λ θ y 2 ϑ θ λ θ y 2 ϑ λ = = x 1 θ x 1 θ x 2 x 2 θ θ θ θ θ θ θ θ θ y 1 y 1 y 2 θ y 2 .

Appendix B

Calculations for the proof of Lemma 3.
I ~ θ θ X ~ θ = θ λ λ λ θ λ θ λ θ λ θ λ λ = θ λ θ λ λ θ θ λ λ θ θ λ θ λ θ λ = θ θ θ θ ,   Y ~ θ θ Z ~ θ = λ θ λ λ θ λ θ θ λ λ θ λ λ = λ θ θ λ θ λ θ λ λ θ θ λ θ λ θ λ = θ θ θ θ ,   I ~ θ θ I ~ θ = θ λ λ λ θ λ θ θ λ λ λ θ λ = θ λ θ θ λ λ θ λ λ θ λ θ λ θ θ λ = H ~ θ ,   V ~ θ θ V ~ θ = ν θ ν θ ν ν θ ν θ ν θ ν ν = ν θ ν θ ν θ θ ν θ ν θ θ ν ν θ ν = = λ θ λ θ λ λ = X ~ θ ,   T ~ θ θ T ~ θ = θ τ τ θ τ τ θ θ τ τ θ τ τ = θ τ θ θ τ τ θ τ θ τ θ θ τ τ θ τ = θ ν ν θ ν ν = S ~ θ ,   S ~ θ θ S ~ θ = θ ν ν θ ν ν θ θ ν ν θ ν ν = θ ν θ θ ν ν θ ν θ ν θ θ ν ν θ ν = θ λ λ θ λ λ = Z ~ θ ,

Appendix C

Calculations for the proof of Lemma 4. Let
x θ = x 1 θ x 1 θ x 2 x 2
be an f-bit. Then
T ~ 2 x θ , H ~ θ = T ~ x 1 ϑ λ θ λ θ x 1 ϑ λ θ λ θ x 2 ϑ λ θ λ x 2 ϑ λ θ λ , H ~ θ = = x 1 ϑ λ θ θ λ 4   t i m e s θ x 1 ϑ λ θ θ λ 4   t i m e s θ x 2 ϑ λ θ θ λ 4   t i m e s x 2 ϑ λ θ θ λ 4   t i m e s ,
and
T ~ T ~ 2 x θ , H ~ θ , Σ 2 1 λ   = = T ~ x 1 ϑ λ θ θ λ 4   t i m e s θ x 1 ϑ λ θ θ λ 4   t i m e s θ x 2 ϑ λ θ θ λ 4   t i m e s x 2 ϑ λ θ θ λ 4   t i m e s , Σ 2 1 λ   = = x 1 ϑ λ θ θ λ 4   t i m e s ϑ λ ϑ ϑ λ 4   t i m e s θ x 1 ϑ λ θ θ λ 4   t i m e s ϑ λ ϑ ϑ λ 4   t i m e s θ x 2 ϑ λ θ θ λ 4   t i m e s ϑ λ ϑ ϑ λ 4   t i m e s x 2 ϑ λ θ θ λ 4   t i m e s ϑ λ ϑ ϑ λ 4   t i m e s = = x 1 θ x 1 θ x 2 x 2 = x θ .

Appendix D

Calculations for the proof of Lemma 4. Let
x θ = x 1 θ x 1 θ x 2 x 2
be an f-bit. Then
T ~ 2 x θ , V ~ θ = T ~ θ x 1 ϑ ν x 1 ϑ ν x 2 ϑ ν θ x 2 ϑ ν , V ~ θ = x 1 ϑ ν ϑ ν θ x 1 ϑ ν ϑ ν θ x 2 ϑ ν ϑ ν x 2 ϑ ν ϑ ν ,
T ~ T ~ 2 x θ , V ~ θ , Π 2 1 ν   = T ~ x 1 ϑ ν ϑ ν θ x 1 ϑ ν ϑ ν θ x 2 ϑ ν ϑ ν x 2 ϑ ν ϑ ν , Π 2 1 ν   = = x 1 ϑ ν ϑ ν ϑ ν ϑ ν θ x 1 ϑ ν ϑ ν ϑ ν ϑ ν θ x 2 ϑ ν ϑ ν ϑ ν ϑ ν x 2 ϑ ν ϑ ν ϑ ν ϑ ν = = x 1 θ x 1 θ x 2 x 2 = x θ .
and
T ~ T ~ 4 x θ , T ~ θ , Π 4 1 τ   = T ~ x 1 ϑ τ ϑ τ ϑ τ ϑ τ θ x 1 ϑ τ ϑ τ ϑ τ ϑ τ x 2 ϑ τ ϑ τ ϑ τ ϑ τ θ x 2 ϑ τ ϑ τ ϑ τ ϑ τ , Π 4 1 τ   = = x 1 ϑ τ ϑ ϑ τ 4   t i m e s ϑ τ ϑ ϑ τ 4   t i m e s θ x 1 ϑ τ ϑ ϑ τ 4   t i m e s ϑ τ ϑ ϑ τ 4   t i m e s θ x 2 ϑ τ ϑ ϑ τ 4   t i m e s ϑ τ ϑ ϑ τ 4   t i m e s x 2 ϑ τ ϑ ϑ τ 4   t i m e s ϑ τ ϑ ϑ τ 4   t i m e s = x 1 θ x 1 θ x 2 x 2 = x θ .

Appendix E

Before formulation of the Deutsch-Jozsa algorithm [13], recall that the function is called constant if for any argument it returns a certain predefined value, and the function is called balanced if a half of its outputs are zeros and a half are units.
Consider four Boolean functions f k : 0,1 0,1 , k = 1 , , 4 , of one argument. Then, the functions f 1 x = 0 and f 2 x = 1 are constant and the functions f 3 x = x and f 4 x = not   x are balanced.
Assume that there is an unknown function f : 0,1 0,1 and it is required to recognize whether the function f is constant or balanced.
The Deutsch-Jozsa algorithm acts as follows. As an input, the algorithm obtains two qubits: qubit O = 1,0 associated with the Boolean value 0 and qubit I = 0,1 associated with the Boolean value 1 . These vectors are superposed into the two-qubit state
ψ 0 = O I = 0,1 , 0,0 ,
where stands for the Kronecker product.
To the state ψ 0 the two-qubit operator H H is applied
ψ 1 = ψ 0 H H = 1 2 0,1 , 0,0 H H H H = 1 2 1 , 1 ,   1 , 1 .
Now the state ψ 1 is processed by the oracle operator U f which is a two-qubit operator representing the function f . Then
ψ 2 = ψ 1 U f = 1 2 1 , 1,1 , 1 U f .
Operator U f represents the functions f 1 , f 2 , f 3 and f 4 . These functions are associated with the two-qubit operators:
U 1 = I 0 0 I ,   U 2 = X 0 0 X ,   U 3 = I 0 0 X   and   U 4 = X 0 0 I .
respectively.
To the state ψ 2 is processed by the qubit operator H I which gives
ψ 3 = ψ 2 H I = ψ 2 1 2 I I I I .
Finally, in the resulting two-qubit state ψ 3 , if the first qubit ψ 31 0,0 , then f is constant and if the first qubit ψ 31 = 0,0 , then f is balanced.
Let us consider the operator U f defined by the operators U 1 , U 2 , U 3 and U 4 :
U f = U 1 :
ψ 2 = 1 2 1 , 1,1 , 1 I 0 0 I = 1 2 1 , 1,1 , 1 ,   ψ 3 = 1 2 1 , 1,1 , 1 1 2 I I I I = 1 2 1 , 1,0 , 0 .
U f = U 2 :
ψ 2 = 1 2 1 , 1,1 , 1 1 2 X 0 0 X = 1 2 1,1 , 1,1 ,   ψ 3 = 1 2 1,1 , 1,1 1 2 I I I I = 1 2 1,1 , 0,0 .
U f = U 3 :
ψ 2 = 1 2 1 , 1,1 , 1 1 2 I 0 0 X = 1 2 1 , 1 , 1,1 ,   ψ 3 = 1 2 1 , 1,1 , 1 1 2 I I I I = 1 2 0,0 , 1 , 1 .
U f = U 4 :
ψ 2 = 1 2 1 , 1,1 , 1 1 2 X 0 0 I = 1 2 1,1 , 1 , 1 ,   ψ 3 = 1 2 1 , 1,1 , 1 1 2 I I I I = 1 2 0,0 , 1,1 .
It is seen that for U f = U 1 the first qubit of ψ 3 is ψ 31 = 1 2 1 , 1 and for U f = U 2 it is ψ 31 = 1 2 1 , 1 ; hence if f = f 1 or f = f 2 it is constant. In contrast, for U f = U 3 the first qubit of ψ 3 is ψ 31 = 0,0 and for U f = U 4 it is ψ 31 = 0,0 ; hence if f = f 3 or f = f 3 it is balanced.

References

  1. Rosenbloom, P. Computing and computation. The Computer Journal 2012, 55(7), 820–824. [Google Scholar] [CrossRef]
  2. MacLennan, B. Analog computation. In Computational Complexity: Theory, Techniques and Applications; Meyers, R., Ed.; Springer Science + Business Media: New York, NY, USA, 2012; pp. 161–184. [Google Scholar]
  3. Minsky, M. Finite and Infinite Machines; Prentice Hall: Englewood Cliffs, NJ, USA, 1967. [Google Scholar]
  4. Rummer, D. Introduction to Analog Computer Programming; Holt, Rinehart and Winston: New York, NY, USA, 1969. [Google Scholar]
  5. McCracken, D. Digital Computer Programming; John Wiley & Sons: New York, NY, USA, 1957. [Google Scholar]
  6. Feynman, R. Simulating physics with computers. Int. Journal of Theoretical Physics 1982, 21(6/7), 467–488. [Google Scholar] [CrossRef]
  7. Feynman, R. Quantum mechanical computers. Optic News, 1985, 11, 11-20. (Reprint: Foundations of Physics, 1986, 16(6), 507-531). [CrossRef]
  8. Birkhoff, G.; Neumann, J. von. The logic of quantum mechanics. Annals of Mathematics 1936, 37(4), 823–843. [Google Scholar] [CrossRef]
  9. Lloyd, S. Quantum information processing. In Computational Complexity: Theory, Techniques and Applications; Meyers, R., Ed.; Springer Science + Business Media: Ney York, NY, USA, 2012; pp. 2496–2534. [Google Scholar]
  10. Pykacz, J. Fuzzy set ideas in quantum logics. Int. Journal of Theoretical Physics 1992, 31(9), 281–290. [Google Scholar] [CrossRef]
  11. Hannachi, S.; Dong, F., Hirota, K. Emulating quantum interference and quantum associative memory using fuzzy qubits. In Proceedings of the IEEE Int. Conference on Computational Cybernetics, Gammarth, Tunisia, 19-21 October 2007.
  12. Hannachi, S.; Hatakeyama, Y., Hirota, K. Emulating qubits with fuzzy logic. J. Advanced Computational Intelligence and Intelligent Informatics 2007, 11(2), 242–249. [CrossRef]
  13. Deutsch, D.; Jozsa, R. Rapid solution of problems by quantum computation. Proc. Royal Society: Mathematical and Physical Sciences 1992, 439(1907), 553–558. [Google Scholar]
  14. Rybalov, A.; Kagan, E.; Manor, Y.; Ben-Gal, I. Fuzzy model of control for quantum-controlled mobile robots. In Proceedings of the IEEE 26-th Convention of Electrical and Electronics Engineers in Israel, Eilat, Israel, 17-20 November 2010. [Google Scholar]
  15. Kagan, E.; Ben-Gal, I. Navigation of quantum-controlled mobile robots. In Recent Advances in Mobile Robotics; Topalov, A., Ed.; Intech: Rijeka, Croatia, 2011; pp. 311–326. [Google Scholar]
  16. Kreinovich, V.; Kohout, L.; Kim, E. Square root of “not”: a major difference between fuzzy and quantum logics. In Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society NAFIPS 2008, New York, NY, USA, 19-22 May 2008. [Google Scholar]
  17. Kosheleva, O.; Kreinovich, V. A Natural formalization of changing-one’s-mind leads to square root of “not” and to complex-valued fuzzy logic. In Explainable AI and Other Applications of Fuzzy Techniques. NAFIPS 2021. Lecture Notes in Networks and Systems; Rayz, J.; Raskin, V.; Dick, S., Kreinovich, V. Eds., 258, Springer: Cham, Switzerland, 2021, 190-195.
  18. Ramot, D.; Milo, R.; Friedman, G.; Kandel, A. Complex fuzzy sets. IEEE Transactions on Fuzzy Systems 2002, 10(2), 171–186. [Google Scholar] [CrossRef]
  19. Ramot, D.; Friedman, M.; Langholz, G.; Kandel, A. Complex fuzzy logic. IEEE Transactions on Fuzzy Systems 2003, 11(4), 450–461. [Google Scholar] [CrossRef]
  20. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
  21. Tsetlin, M. Automaton Theory and Modeling of Biological Systems; Academic Press: New York, 1973. [Google Scholar]
  22. Yager, R.; Rybalov, A. Uninorm aggregation operators. Fuzzy Sets and Systems 1996, 80, 111–120. [Google Scholar] [CrossRef]
  23. Dombi, J. Basic concepts for the theory of evaluation: the aggregative operator. European J. of Operations Research 1982, 10, 282–293. [Google Scholar] [CrossRef]
  24. Rudas, I. New approach to information aggregation. Zbornik Radova 2000, 2, 163–176. [Google Scholar]
  25. Fodor, J., Rudas, I., Bede, B. Uninorms and absorbing norms with applications to image processing. In Proceedings of the 4th Serbian Hungarian Joint Symposium on Intelligent Systems, Subotica, Serbia, 29–30 September 2006; pp. 59–72.
  26. Kagan, E.; Rybalov, A.; Yager, R. Multi-Valued Logic for Decision-Making Under Uncertainty; Springer Nature / Birkhäuser: Cham, Switzerland, 2025. [Google Scholar]
  27. Kagan, E., Rybalov, A., Yager, R. Sum of certainties with the product of reasons: neural network with fuzzy aggregators. Int. J. of Uncertainty, Fuzziness and Knowledge Based Systems 2022, 30(1), 1–18. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated